How does FailSafe Interceptor work?
By monitoring all pending transactions that are queued in the memory pool, FailSafe Interceptor determines whether pending transactions attempting to interact with FailSafe-protected could represent a possible threat. In the event a pending transaction is deemed to be unauthorised (either based on user-defined policies or detection of a high-risk interacting address), FailSafe Interceptor swiftly deploys a Recovery Vault, a smart contract that submits a counter-transaction to neutralises the attacker’s transaction – it achieves this by manipulating gas fees to ensure FailSafe’s transaction is prioritised and validated before the attacker’s transaction. This method is called frontrunning. The time window available for FailSafe Interceptor to submit the counter-transaction is typically 100 to 200 milliseconds.
Last updated